Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe
Resource
win7-20221111-en
General
-
Target
b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe
-
Size
769KB
-
MD5
f0e1484d691b12431fba91c0e2496302
-
SHA1
94aefda8547526f272bf61505533ad45833c9953
-
SHA256
b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf
-
SHA512
2d75c952a9831c202e4c2e9e3d8afdfd9624566ee149e508a161ef613832938c4b315505be0c4f458b16c37370ea4039f3a87081feb295e793afa0650af13d58
-
SSDEEP
12288:TBzLY3O3AibXVa37V5kNlyXo8HHUYbQEZyKKa1Lb/Zr+aXbKuGduiTsJXrMxh3HN:THXwjRO8d44oep
Malware Config
Extracted
cybergate
v1.10.4
EX4
trinity.serveftp.com:4200
2X3B3ON7QEJ84M
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
eggnet
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1740 set thread context of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2020 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 28 PID 1740 wrote to memory of 2020 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 28 PID 1740 wrote to memory of 2020 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 28 PID 1740 wrote to memory of 2020 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 28 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29 PID 1740 wrote to memory of 292 1740 b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe"C:\Users\Admin\AppData\Local\Temp\b2b74bbcb632baa881c1b1bf3101668c7180d5f5fddc05cc2db01fc225c81ebf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\notepad.exeC:\Windows\notepad.exe2⤵PID:2020
-
-
C:\Windows\notepad.exeC:\Windows\notepad.exe2⤵PID:292
-